-
1
-
-
85059766484
-
Live migration of virtual machines
-
USENIX Association, Berkeley
-
Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: USENIX Symposium on Networked Systems Design & Implementation (NSDI), pp. 273-286. USENIX Association, Berkeley (2005)
-
(2005)
USENIX Symposium on Networked Systems Design & Implementation (NSDI)
, pp. 273-286
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
2
-
-
79951625718
-
-
July
-
Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., Rejaie, R.: Is content publishing in BitTorrent altruistic or profit-driven (July 2010), http://arxiv.org/abs/1007.2327
-
(2010)
Is Content Publishing in BitTorrent Altruistic or Profit-driven
-
-
Cuevas, R.1
Kryczka, M.2
Cuevas, A.3
Kaune, S.4
Guerrero, C.5
Rejaie, R.6
-
3
-
-
85065163256
-
Remus: High availability via asynchronous virtual machine replication
-
USENIX Association, Berkeley (April)
-
Cully, B., Lefebvre, G., Meyer, D.T., Karollil, A., Feeley, M.J., Hutchinson, N.C., Warfield, A.: Remus: High availability via asynchronous virtual machine replication. In: USENIX Symposium on Networked Systems Design & Implementation (NSDI). USENIX Association, Berkeley (April 2008)
-
(2008)
USENIX Symposium on Networked Systems Design & Implementation (NSDI)
-
-
Cully, B.1
Lefebvre, G.2
Meyer, D.T.3
Karollil, A.4
Feeley, M.J.5
Hutchinson, N.C.6
Warfield, A.7
-
4
-
-
78751670921
-
The things that make me weak and strange get engineered away
-
August
-
Doctorow, C.: The Things that Make Me Weak and Strange Get Engineered Away. Tor.com (August 2008), http://www.tor.com/stories/2008/08/weak-and-strange
-
(2008)
Tor. Com
-
-
Doctorow, C.1
-
5
-
-
33746335051
-
Differential privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
7
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
August
-
Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing data privacy with self-destructing data. In: Proceedings of the USENIX Security Symposium (August 2009)
-
(2009)
Proceedings of the USENIX Security Symposium
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
8
-
-
78650854161
-
Serving ads from localhost for performance, privacy, and profit
-
New York, NY (October)
-
Guha, S., Reznichenko, A., Tang, K., Haddadi, H., Francis, P.: Serving Ads from localhost for Performance, Privacy, and Profit. In: Proceedings of Hot Topics in Networking (HotNets), New York, NY (October 2009)
-
(2009)
Proceedings of Hot Topics in Networking (HotNets)
-
-
Guha, S.1
Reznichenko, A.2
Tang, K.3
Haddadi, H.4
Francis, P.5
-
10
-
-
77954364618
-
Will nosql databases live up to their promise?
-
Leavitt, N.: Will nosql databases live up to their promise? Computer 43(2), 12-14 (2010), http://dx.doi.org/10.1109/MC.2010.58
-
(2010)
Computer
, vol.43
, Issue.2
, pp. 12-14
-
-
Leavitt, N.1
-
11
-
-
78751658932
-
Turning down the LAMP: Software specialisation for the cloud
-
USENIX Association, Berkeley
-
Madhavapeddy, A., Mortier, R., Sohan, R., Gazagnaire, T., Hand, S., Deegan, T., McAuley, D., Crowcroft, J.: Turning down the LAMP: software specialisation for the cloud. In: HotCloud 2010: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, p. 11. USENIX Association, Berkeley (2010)
-
(2010)
HotCloud 2010: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing
, pp. 11
-
-
Madhavapeddy, A.1
Mortier, R.2
Sohan, R.3
Gazagnaire, T.4
Hand, S.5
Deegan, T.6
McAuley, D.7
Crowcroft, J.8
-
12
-
-
84874762005
-
The personal container or your lif. in bit
-
October
-
Mortier, R.: et al.: The Personal Container, or Your Lif. In Bit. In: Proceedings of Digital Futures (October 2010)
-
(2010)
Proceedings of Digital Futures
-
-
Mortier, R.1
-
13
-
-
79958736612
-
Using Dust Clouds to enhance anonymous communication
-
April
-
Mortier, R., Madhavapeddy, A., Hong, T., Murray, D., Schwarzkopf, M.: Using Dust Clouds to enhance anonymous communication. In: Proceedings of the Eighteenth International Workshop on Security Protocols, IWSP (April 2010)
-
(2010)
Proceedings of the Eighteenth International Workshop on Security Protocols, IWSP
-
-
Mortier, R.1
Madhavapeddy, A.2
Hong, T.3
Murray, D.4
Schwarzkopf, M.5
-
14
-
-
0007968045
-
Virtual network computing
-
Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual network computing. IEEE Internet Computing 2(1), 33-38 (1998)
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.1
, pp. 33-38
-
-
Richardson, T.1
Stafford-Fraser, Q.2
Wood, K.R.3
Hopper, A.4
-
16
-
-
70350117803
-
Privacy in content-based opportunistic networks
-
Shikfa, A., Önen, M., Molva, R.: Privacy in content-based opportunistic networks. In: AINA Workshops, pp. 832-837 (2009)
-
(2009)
AINA Workshops
, pp. 832-837
-
-
Shikfa, A.1
Önen, M.2
Molva, R.3
-
17
-
-
38149074798
-
Haggle: Seamless networking for mobile applications
-
Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. Springer, Heidelberg
-
Su, J., Scott, J., Hui, P., Crowcroft, J., De Lara, E., Diot, C., Goel, A., Lim, M.H., Upton, E.: Haggle: Seamless networking for mobile applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 391-408. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4717
, pp. 391-408
-
-
Su, J.1
Scott, J.2
Hui, P.3
Crowcroft, J.4
De Lara, E.5
Diot, C.6
Goel, A.7
Lim, M.H.8
Upton, E.9
-
19
-
-
85180531810
-
Defeating vanish with low-cost sybil attacks against large DHTs
-
Wolchok, S., Hofmann, O., Heninger, N., Felten, E., Halderman, J., Rossbach, C., Waters, B., Witchel, E.: Defeating vanish with low-cost sybil attacks against large DHTs. In: Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), pp. 37-51 (2010)
-
(2010)
Proceedings of the 17th Network and Distributed System Security Symposium (NDSS)
, pp. 37-51
-
-
Wolchok, S.1
Hofmann, O.2
Heninger, N.3
Felten, E.4
Halderman, J.5
Rossbach, C.6
Waters, B.7
Witchel, E.8
|